Lucene search

K
nessusThis script is Copyright (C) 2015-2024 and is owned by Tenable, Inc. or an Affiliate thereof.ORACLE_WEBCENTER_PORTAL_JULY_2015_CPU.NBIN
HistoryJul 22, 2015 - 12:00 a.m.

Oracle WebCenter Portal Multiple Vulnerabilities (July 2015 CPU)

2015-07-2200:00:00
This script is Copyright (C) 2015-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

55.8%

The remote host has a version of Oracle WebCenter Portal installed that is affected by the following vulnerabilities :

  • A flaw exists in Oracle’s implementation of the JSR (Java Specification Request) 286 Portlet Specification functionality. A remote, authenticated attacker can exploit this, via crafted portal URL, to affect confidentiality and integrity. (CVE-2015-1926)

  • A security bypass vulnerability exists in the Portlet Bridge for JavaServer Faces due to a failure to properly restrict access to resources in web applications. A remote attacker can exploit this, via a URL with a modified resource ID, to disclose sensitive information.
    (CVE-2015-3244)

Binary data oracle_webcenter_portal_july_2015_cpu.nbin
VendorProductVersionCPE
oraclefusion_middlewarecpe:/a:oracle:fusion_middleware

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

55.8%

Related for ORACLE_WEBCENTER_PORTAL_JULY_2015_CPU.NBIN